NEWS
How the evolution of tokenization can be utilised to better protect data

Traditionally, methods of data protection have focused on locking up their sensitive information away until it was deprotected to be used. While this may work for data that serves no current purpose, simply locking away the data greatly reduces its value, especially if the risks of loss of business...

Read More
NEWS
Securing the cloud: how to address new security risks and future-proof operations post-COVID-19

How can organisations overcome today’s cyber security challenges to protect systems and data within and across multiple cloud environments – and underpin new ways of working since COVID-19? By Phil Aitchison, Chief Operating Officer, Big Data & Security UK&I at Atos.

Read More
NEWS
Are increasing data breaches leaving consumers desensitised?

Cyberattacks are on the rise, with novel cybersecurity risks emerging as companies are currently forced to do business in unprecedented ways. By Stefanie Wood Ellis, AntiFraud Product & Marketing Director, OpSec Security.

Read More
NEWS
Cloud-based multi-factor authentication: the starting point for security, compliance and user experience

Banks and businesses are constantly under pressure to keep their data, customers, and employees secure. This has heightened in the last few months, as the global pandemic has seen cybercriminals ramp up activity. The number of phishing websites increasing by 350% since the start of the year, and...

Read More
NEWS
What to look for in a Next-Gen PAM solution

By Alan Radford, PAM Field Strategist, One Identity.

Read More
NEWS
Five factors that form how Security Awareness training programs are developing

By Elena Molchanova, Head of Security Awareness Marketing, Kaspersky.

Read More
NEWS
What’s next for cybersecurity?

A recent HP panel discussion sought to provide some answers to this question – topics covered...

Read More
NEWS
The attack that changed the world of cyber security for ever

You may be surprised to learn that one of the first computer viruses to bring millions of computers...

Read More
NEWS
Zero Trust Network Access (ZTNA) vs VPNs: The new era of securing your workforce during crisis

By Salvatore Sinno, Chief Security Architect and Director of Cybersecurity Innovation, Unisys.

Read More
NEWS
Trend EDR: Protecting endpoints proactively

How IT managers protect corporate networks from targeted attacks By Chris Connell, Deputy Vice...

Read More

Videos

In this video, DCS talks to Essentra at DCW 2025
Frank Koelmel, CRO at Logpoint, discusses the new partner program which sees the company amplifying its strategic focus on Managed Security Service Providers (MSSPs), opening opportunities for MSSPs to...
Lee Caswell, SVP, Product and Solutions Marketing at Nutanix, discusses the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress...
Vivek Behl, Vice President, Strategy at WalkMe, discusses the findings of the company’s annual report, The State of Digital Adoption 2025, Special AI Edition. This year’s report focuses on AI adoption in...

News

Nerdio Manager for MSP 6.0 delivers major innovations for automating, securing, and troubleshooting Microsoft 365 and AVD environments.
Economist Impact is pleased to announce the inaugural AI Compute summit, scheduled for May 22nd 2025, at the Scandic Copenhagen in Copenhagen. This premier event will convene over 300 industry leaders to...
Mercury Power, a leading provider of critical solutions to the data centre industry, has opened its new state-of-the-art offices at Ocean Village in Southampton. This strategic move is part of Mercury Power's...
Hughes Network Systems announces the availability of Low Earth Orbit (LEO) satellite service.